The speaker’s profile picture
Anna Prudnikova

Head of International Cybersecurity, Secura, a Bureau Veritas company.

Anna Prudnikova is an expert r in the field of industrial cybersecurity with a specific focus on products with over ten years of professional experience in the field of cybersecurity assessment and auditing. Her expertise in cybersecurity ranges from audit and assurance experience to technical expertise in testing. Her career in cybersecurity started in a position as a cybersecurity consultant in 2011. Within BV, Anna is responsible for sales and operations of cybersecurity services delivered in Europe and MER. She is actively involved in activities including supporting the development of services in the areas of ICS, automotive, medical devices, IoT, cloud etc.

  • Charting The Course: Navigating Maritime Cybersecurity
The speaker’s profile picture
Boekenwuurm

Christel Sanders is a purple loving physicist whose first hacker camp was EMF in 2016. It was love at the first sight, and she went on to help organizing the dutch hacker camps. She is hanging around Hackalot, the hackerspace in Eindhoven that she helped build.
As the co-chair of Stichting IFCAT, hacker and a passionate advocate for digital knowledge and maker skills, she loves having an active role in the Dutch hacker community.

  • From Galactic Hacker Party 1989 to WHY2025; the history, future and importance of Dutch Hacker Camps.
The speaker’s profile picture
Chantal Stekelenburg

Chantal Stekelenburg is Head of Hackers at Zerocopter. She takes care of one of the most important aspects of Zerocopter's services: the community of hackers. As a co-founder and organizer of WICCA (Women in Cybersecurity Community Association), she is also involved in bringing infosec ladies and security enthusiasts together to learn about exploits, hacking, incident response, forensics, the low-level stuff, hardware hacking, and especially making bad crypto jokes! Her main goal is to build a community of badass women in the Netherlands and hopefully inspire future generations to join keyboards and get the hacking started!

  • OPENING
  • Closing
The speaker’s profile picture
Daniela

Working in cyber for a bit over 20 years. Many roles, many projects, still very happy to stay hands on and in the operations side of things.

  • IR to CTI - the other side of the coin
The speaker’s profile picture
Daniëlle Wagemakers

Daniëlle Wagemakers is a DevSecOps consultant at Sogeti, where she helps clients with threat modeling, shift-left of security to earlier in the development lifecycle and security testing. In 2024 she joined the WICCA (Women In Cybersecurity Community Association) core team as an organizer. Daniëlle is passionate about threat modeling personal lives as ways of protection against stalkers and has presented on this topic at WICCON, Hacker Hotel and PancakesCon. Besides WICCA Daniëlle is also active in the WHY2025 hacker camp organization, because building up a supportive and inclusive community is what it's all about .

  • OPENING
The speaker’s profile picture
Diana Makienko

I have been working in customer-facing roles in the multinational financial industry from the very beginning of my career. The Bangladesh hack ignited my interest for cybersecurity, leading me to enroll into executive cyber security masters at Leiden University. I graduated cum laude with a research paper on malicious insider threats. I'm particularly passionate about the human factor in cybersecurity and am a certified insider risk manager. Currently, I am the Business Information Security Officer (BISO) at Swift.

Beyond my professional endeavors, I am a proud mother of two young adults, a certified coach, a creative public speaker, and a skilled debate moderator. I speak six languages, enjoy traveling, sports, cooking and music, and have a keen interest in politics.

  • Inside Job: Tackling Insider Risk from All Angles
The speaker’s profile picture
Dominika Rusek Jonkers

Dominika is one of the Senior Security Specialists at Secura with 10 years of experience in industrial cybersecurity. Her experience spans from pentesting critical infrastructure (like manufacturing, energy, pharma, terminals, trains) to implementing concrete solutions (like ICS monitoring, or network segmentation). She also enjoys occasional hacking of IoT devices and some good old soldering projects. Her background is in Security and Network Engineering.

  • A Glimpse into the World of ICS Monitoring
The speaker’s profile picture
Ellen van Leeuwen

I have a BsC in Computer Science and am a Full-Stack software developer with 6 years of experience. Currently I work at the Kiesraad (Electoral Council) and we are building the new software to support vote counting and help with seat distribution. We primarily code in Typescript (React) and Rust.
In my free time I love watching movies and series and I listen to podcasts all the time. I have a passion for sustainability and train travel and love to hike and scuba dive on holidays.

  • Abacus: Software for Secure and Transparent Voting Results
The speaker’s profile picture
Emily Jacometti

Emily Jacometti is the co-founder of HackShield, a platform focused on digital safety for children. Active in the gaming industry since 2008, she is on the board of the Dutch Game Association and an ambassador for Women in Tech and VHTO. Emily is a keynote speaker who champions inclusivity for women and girls in tech. As a mother of three, she is dedicated to creating a safe and inclusive digital future for children worldwide.
The power of gamification and storytelling lies in the heart of HackShield. We truly believe that these values can make education fun and engaging. . My personal goal is to make HackShield equal as fun as educational. My job is done when our players are not even realizing that they are learning anymore.

  • Hackshield
The speaker’s profile picture
Faith Opiyo

Faith Opiyo is a Senior Technical Staff Member and Threat Hunt Manager at IBM CISO, where she leads a team in proactively identifying advanced threats and threat actors. In addition to her day job, Faith volunteers as an organizer for Women in Cybersecurity Community Association (WICCA) and co-hosts OutofBand, a podcast that promotes cognitive diversity and honest conversations in cybersecurity. Above all, Faith’s favourite new role is being a mom to her little human.

  • OPENING
The speaker’s profile picture
Fleur van Leusden

Fleur is a well known security expert and CISO, working for multiple Dutch government organisations in the past. She currently works as CISO for the Dutch Electoral Council and has developed a fascination with digitalized voting and voting machines.

She also has a podcast (Dutch language) called "CISO praat" on security related subjects.

  • Hacking the vote: why the paper trail matters in elections
The speaker’s profile picture
Gerine Lodder

Gerine Lodder, a self-proclaimed data lover and a bit of a nerd, currently serves as the Product Manager of Awareness & Behaviour at Northwave Cybersecurity. After earning her PhD in psychology, she spent 12 years as a behavioural scientist before transitioning to cybersecurity in 2022. At Northwave, she applies her scientific insights into effective behavioural measurement and change, focusing on the human factor in cybersecurity, measuring cybersafe behaviour, and mitigating the mental health effects of ransomware, and effective cybersafe behaviour interventions.

  • Metrics matter in effective human risk management
The speaker’s profile picture
Helma de Boer

Helma is a privacy and security professional, currently working as information security officer with SURF, the ICT cooperation for education and research. Early in her career, she worked as a legal assistant. She taught herself programming in the 1990s and built many websites and databases for SMEs. She worked with Arjen Kamphuis on the book Personal information security for the Dutch Broodfonds and she maintains the website beschermjegegevens.nl. She is certified DPO, Information Privacy Technologist (CIPT) and CISM.

  • Mission: Impossible - Chatcontrol
The speaker’s profile picture
Ilse Ruesink

Ilse works at the Dutch Police for almost 5 years as part of the regional Cybercrime Unit of Midden-Nederland. She is working as a digital forensic examiner on different kind of cybercrime cases, from hunting botnets and their creators to different kinds of banking fraud.

  • Melting the Ice: Heating up the IcedID infrastructure
The speaker’s profile picture
Irina Chiscop

Irina is a Security Engineer with background in mathematics. She started her career in cybersecurity doing research on network anomaly detection methods. In 2023 she decided it was time to put all theory in practice, so she joined Adyen. During the day you'll find her delving into complex IT infrastructure and writing python code, during the evening on the volleyball court.

  • A crash-course in container security: what is a container and what does it have to do with security?
The speaker’s profile picture
Jaimy Thepass

A former army officer who is guiding the Red Team of Northwave Cyber Security through the mazes of commercial ethical hacking. Loves tech but people in tech even more. Raises questions about leadership in general and especially female- and expert leadership. Loves cars, hates high latency during COD.

  • OPENING
The speaker’s profile picture
Janna Brummel

Senior Engineering Manager of Site Reliability Engineering, currently at WeTransfer but at ING before, with a love for anything reliability, quality and engineering productivity, preferably through a mix of product and people management. I also run the Site Reliability Engineering NL Meetup group.

  • Build your own role-playing game: the business continuity drill
The speaker’s profile picture
Jaya Baloo

Jaya Baloo is an information security professional with more than 20 years’ experience leading and contributing to secure network architecture. As Chief Security Officer (CSO) at Rapid7, Jaya leads the efforts to evolve and mature the company’s internal security program, engages with customers as well as with the wider security community, and collaborates across all Rapid7 teams to develop and showcase security best practices.

Before joining Rapid7, Jaya was CISO at Avast and at KPN, the largest telecommunications carrier in the Netherlands, where she established and led its security team to create world class best practices in strategy and policy. Jaya has also been a faculty member of Singularity University since 2017, where she regularly lectures.

Jaya sits on the advisory boards of the NL’s National Cyber Security Centre, PQCrypto, and the EU Quantum Flagship’s Strategic Advisory Board. She serves on the audit committee of TIIN capital, a cybersecurity fund, and is also a board member of the RvT of the Dutch Broadcasting station, the NOS. She is recognized within the list of top 100 CISOs globally.

  • Closing keynote - are we quiet quitting in Cyber?
The speaker’s profile picture
Jennifer Wennekers

As a dedicated Cyber Threat Intelligence Lead at ASICS, I am committed to safeguarding our organisation and its customers from evolving cyber threats. My role involves not only protecting against potential cyber-attacks but also ensuring we are prepared to respond and improve in their aftermath. I am passionate about staying ahead of the cyber threat landscape to ensure ASICS continues to deliver on its promise of moving minds through the power of exercise and delivering continuous value to our community.

  • Running Forward: Year 1 of Building a CTI capability for a Sportswear Brand
The speaker’s profile picture
Karen Sikkema

Karen Sikkema has been working in game-based learning for nearly 20 years at her serious game studio, Living Story. She is an early pioneer in the field of game-based learning and gamification, helping organizations make learning adventurous and interactive. With her team at Living Story, Karen focuses on motivation and job satisfaction in organizations, as well as learning, discovering talents, engagement, and storytelling experiences. Karen is a concept developer and game designer, with extensive experience as a trainer, facilitator, (guest) lecturer, and a sought-after national and international speaker. She is also the author of the 2023 Management Book of the Year, Spelen Werkt (Playing Works).

  • Serious gaming for behavioural change.
The speaker’s profile picture
Kinga Kieczkowska

Kinga Kieczkowska is a cyber security consultant with a keen interest in digital forensics. She's passionate about all things cyber security, from building security awareness and culture to security operations and engineering. She currently splits her time between working in security architecture at a bank and consulting through her own consultancy Rada Cyber Security. After hours she blogs about macOS and iOS security on kieczkowska.com.

  • AirDrop Forensics
The speaker’s profile picture
Laura Pavias

Laura Pavias is a senior advisor Digital Investigation & Cybercrime at the Netherlands Public Prosecution Service. In complex issues she makes the connections between the legal, the technical and the tactical aspects of a criminal investigation

  • Is Telegram the new darkweb?
The speaker’s profile picture
Lilian Knippenberg

Lilian Knippenberg works at the Municipality of The Hague. At the city of peach & justice, cyber- and information security is very important to keep the information and citizens of The Hague safe. My role as senior advisor and deputy CISO is to work towards a high resilient organization against digital attacks. I am focused on people and processes.

  • Hâck The Hague: making impact with your vulnerability reports
The speaker’s profile picture
Lucile Renhas

Lucile Renhas is an accomplished Insider Risk Consultant at Signpost Six, bringing a background in international relations to her role. She excels in managing and directing projects for multinational clients, collaborating closely with business leads and stakeholders to ensure successful outcomes. For the past two years, Lucile has been at the forefront of guiding a leading pharmaceutical company’s insider risk programme. Lucile holds a master's degree in Crisis and Security Management from Leiden University, specialising in the governance of radicalism, extremism, and terrorism.

  • Inside Job: Tackling Insider Risk from All Angles
The speaker’s profile picture
Maike Borst

Maike Borst is digital specialist (OSINT) at the Dutch Police.

  • Is Telegram the new darkweb?
The speaker’s profile picture
Marc Visser

i have been working in industrial environments for almost 10 years, from food to energy to automotive.
everyday life is filled with operational equipment, therefor i would like to share my insights of this world and need you to help us safeguard our critical infrastructure

  • Introduction to Industrial Control Systems: Hands-On Hacking
The speaker’s profile picture
Maresa Vermulst

I am Maresa Vermulst. I’ve worked at KPN Security as a security researcher and as an incident responder at the Chamber of Commerce.
Now, as a detection engineer at Northwave Cybersecurity, my days revolve around analyzing logs, identifying threats, and fine-tuning our detection. Beyond the office, I’m an OSINT enthusiast and help to find people when needed. I also join the occasional CTF.

  • Defender Chronicles: the defeat of the ransomware curse
The speaker’s profile picture
Marjolein Tamis

Documentation Specialist

  • Abacus: Software for Secure and Transparent Voting Results
The speaker’s profile picture
Martine Koch

Martine is teamlead for a group of SOC engineers at Northwave. She has diverse experience in the field, from pentester to business security consultant. She uses her wide knowledge on security to help improve the daily security operations within Northwave.

  • Defender Chronicles: the defeat of the ransomware curse
The speaker’s profile picture
Mireia Cano

I am a security engineer focused on application security, with over 6 years of experience. I have helped companies build their application security programs both as a consultant and as an in-house security engineer. I am passionate about fostering collaboration between development and security teams to enhance organizational security posture and resilience.

  • Building an Appsec Program from Scratch
The speaker’s profile picture
Nancy Beers

Nancy Beers is a seasoned gamification expert, and the owner of Happy Game Changers. With over 25 years of experience in ICT, Nancy brings a wealth of knowledge and expertise to the table. As the co-chair of Stichting IFCAT, hacker and a passionate advocate for digital rights and freedoms, she has been instrumental in shaping the Dutch hacker community.
Nancy is not only an international speaker but also an avid participant in various ICT events worldwide. She is known for her engaging talks on topics ranging from female leadership, Women in Tech, cybersecurity to gamification, captivating audiences with her insights and expertise.
In addition to her speaking engagements, Nancy is deeply involved in the organization of WHY2025, the next big Dutch Hacker Camp. Her dedication to fostering collaboration, innovation, and exploration within the hacker community is evident in her role as a co organizer of this event.
Beyond her professional endeavors, Nancy is an amateur social engineer, open source hippie and constantly seeking new ways to leverage technology for positive change. With her unique blend of technical skills and social insight, she continues to push the boundaries of what is possible in the world of hacking and beyond.

  • Serious gaming for behavioural change.
The speaker’s profile picture
Nicole van der Meulen

Nicole van der Meulen is an experienced professional and thought leader in the area of cybercrime and cyber security. Currently she serves as Cyber Security Innovation Lead at SURF. Previously she was the Head of Policy & Development at Europol’s European Cybercrime Centre (EC3), where she was responsible, amongst others, for the Internet Organised Crime Threat Assessment (IOCTA). Prior to Europol, she held various positions in the Dutch public sector, academia and for nonprofit organisations all focused on enhancing the fight against cybercrime and improving cyber security. She obtained her PhD in 2010 from Tilburg University on a comparative study focusing on digital identity fraud in the United States and the Netherlands.

  • When artificial becomes authentic, how do I prove I am me?
The speaker’s profile picture
Raluca Viziteu

My name is Raluca Viziteu. I work as a cybersecurity consultant for Secura. I am from Bucharest, Romania. I moved to the Netherlands 7 years ago and studied Computer Science and Engineering at the Eindhoven University of Technology for my bachelor's and Information Security Technology for my master's. For my job as a cybersecurity consultant at Secura I focus on certifications. I aid our customers to achieve compliance with various cybersecurity standards and regulations. This year, my main focus has been the upcoming Cyber Resilience Act.

  • How to navigate the Cyber Resilience Act
The speaker’s profile picture
Reinout Hoornweg

Reinout Hoornweg is a senior security advisor with a focus on technology at the Municipality of The Hague. His day to day responsibilities include Managed Detection & Response, Attack Service Management, Coordinated Vulnerability Disclosure, facilitating pentests and, of course, helping colleagues with advice on cybersecurity.

  • Hâck The Hague: making impact with your vulnerability reports
The speaker’s profile picture
Shelly Raban

Shelly is a Senior Security Researcher at Tenable, specializing in cloud security research. In her previous roles, Shelly worked as a security researcher and threat hunting expert at Hunters. With 7 years of experience in cybersecurity, Shelly has conducted extensive research in detection engineering, host forensics, malware analysis, and reverse engineering. Outside of work, Shelly loves spending time with her two baby cats.

  • Who Watches the Watchmen? Stealing Credentials from Policy-as-Code Engines (and beyond)
The speaker’s profile picture
Tamara Onos

Tamara Onos is an occupational hygienist who works for industry associations, trade unions, and companies in the chemical and construction sectors. Her primary focus is reducing exposure to hazardous chemicals to prevent work-related illnesses. A key aspect of her work involves educating both employers and employees about occupational risks. Tamara enjoys using unconventional methods, such as suspense novels and serious games. One example is "100 Ways to Die at Work," a game she co-developed with Living Story and 100kilo.nl.

  • 100 Ways to Die at Work
The speaker’s profile picture
Tirza

Hi everyone! I’m Tirza, but my friends call me TiDi. Discovering I’m autistic was a huge AHA moment—like finding out I’ve been using the wrong password all my life.

I’ve always loved computers and technology, but school only interested me when it involved tech. After leaving school early and becoming independent, I turned my passion into a career.

  • Turning Neurodiversity into a Strength
The speaker’s profile picture
VM

Jack of all trades. Master of some. Security engineer by day, cybercrime fiction writer by night. As a Security Engineer at GitLab, Valentine's work consists of putting out cyber fires, building automation to make her work easier, and designing value metrics for the division. Besides toying with digital systems, she’s a fiction writer who likes Star Wars, metal music, and useless things like chickens and D&D.

  • OPENING
  • Closing
The speaker’s profile picture
Yaren Cirit

Yaren is a Digital Product Designer in the Awareways, she combines her Visual Design degrees from Yasar University and Hogeschool Utrecht. Her focus is on understanding business goals and learning objectives and translating them into effective digital learning solutions, such as our learning platform and skill games.

  • Conversation Starters & Security & Privacy Skill Games
The speaker’s profile picture
Za-Zie Kuipers

From her master's studies in Behaviour Change and Communication Science, Za-Zie applies her knowledge and skills as a program manager and social psychologist. Indeed, the combination of a master’s in Psychology and a master’s in Communication Science directly engages two fields that we use to facilitate behavior change in security & privacy.

  • Conversation Starters & Security & Privacy Skill Games